Judee K Burgoon

Judee K Burgoon
The University of Arizona | UA · Center for the Management of Information

EdD

About

383
Publications
436,838
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
24,435
Citations
Citations since 2017
63 Research Items
9539 Citations
201720182019202020212022202305001,0001,500
201720182019202020212022202305001,0001,500
201720182019202020212022202305001,0001,500
201720182019202020212022202305001,0001,500
Additional affiliations
January 2000 - September 2015
The University of Arizona
Position
  • Professor (Full) and Director of Research
September 1989 - January 1990
Harvard University
Position
  • Researcher
August 1978 - May 1983
Michigan State University
Position
  • Professor (Associate)

Publications

Publications (383)
Chapter
Full-text available
A fundamental underpinning of all social relationships is trust. Trust can be established through implicit forms of communication called relational messages. A multidisciplinary, multi-university, cross-cultural investigation addressed how these message themes are expressed and whether they are moderated by culture and veracity. A multi-round decis...
Article
Full-text available
This investigation sought to find the relationships among multiple dimensions of personality and multiple features of language style. Unlike previous investigations, after controlling for such other moderators as culture and socio-demographics, the current investigation explored those dimensions of naturalistic spoken language that most closely ali...
Article
Full-text available
Social relationships are constructed by and through the relational communication that people exchange. Relational messages are implicit nonverbal and verbal messages that signal how people regard one another and define their interpersonal relationships-equal or unequal, affectionate or hostile, inclusive or exclusive, similar or dissimilar, and so...
Article
Full-text available
Trust between group members has many implications for how well a group performs. In this study, we predict perceived trustworthiness of group members when there are subversive group members. We collected multimodal verbal and non-verbal data from a group interaction experiment. During the interaction, we periodically surveyed the group members abou...
Chapter
This study examines the joint impact of modality interactivity and deception on the quality of group communication and subsequent group outcomes. Communication quality was examined as three meta-dimensions of relational communication, interactional communication, and task communication qualities. Results from two experiments indicated that audio co...
Chapter
This prelude to the Socio-Cultural Attitudinal Networks project, funded by the U.S. Army Research Office Multi-University Research Initiative, introduces the concept of relational communication and its relationship to interpersonal deception. The research protocol is described wherein groups of interactants engaged in a multi-round game of Resistan...
Chapter
The majority of deception research to date has focused on deception in the context of dyadic communication. Among this body of research are efforts to identify what signals can be used to discriminate deceivers from non-deceivers. The general form of this research involves observing (typically recording to observe and/or manually code after the fac...
Chapter
The literature on indicators of deception is extensive, yet few rigorous investigations have documented the deceptive communication behavior associated with culture. Notwithstanding, culture can play a profound role in affecting the emotional and cognitive factors that are theorized to differentiate behavioral patterns between deceivers and truth-t...
Chapter
In this study, we address a cross-domain problem of applying computer vision approaches to reason about human facial behavior when people play The Resistance game. To capture the facial behaviors, we first collect several hours of video where the participants playing The Resistance game assume the roles of deceivers (spies) vs truth-tellers (villag...
Chapter
Trust is an integral part of interpersonal relationships. Achieving trust is a goal in most relationships, although there are occasions when wariness and distrust are warranted instead. This chapter presents a new model of trust called the “Spiral Model of Trust” which incorporates concepts from a wide range of disciplinary perspectives. The theory...
Chapter
Power is an integral part of group dynamics and when deception is involved, it affects the process of group decision-making as well as the outcomes of those decisions. We examined 95 groups playing a popular party card game called Mafia in which some players were randomly assigned the role of Spies, and others, the role of Villagers. Spies conceale...
Chapter
Adversarial group negotiations often involve contentious strategies such as deception and dominance. Understanding characteristics of language and voice associated with deception and dominance helps negotiators identify the use of these strategies and achieve higher self-interests in various use cases, including business negotiations and law enforc...
Article
Full-text available
Nonverbal signals color the meanings of interpersonal relationships. Humans rely on facial, head, postural, and vocal signals to express relational messages along continua. Three of relevance are dominance-submission, composure-nervousness and trust-distrust. Machine learning and new automated analysis tools are making possible a deeper understandi...
Chapter
In this paper, we approach the problem of deception detection in videos. Current approaches are limited since they (i) are used in short videos focusing only on a small act of deception, (ii) are hard to interpret, and (iii) do not make use of any human model that could help them in the detection task. To address those limitations, we propose a nov...
Book
This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial game, based on the well-known Mafia and Resistance games, as well as selected other settings. This book develops statistical results linking different types of facial expressions (e.g. smile, pursed lips, raised eyebrows), vocal features (e.g., pitch, lo...
Article
Deception is an unfortunate staple in group work. Guarding against team members’ deceptive tactics and alternative agendas is difficult and may seem even more difficult in technology-driven business environments that have made multitasking during teamwork increasingly commonplace. This research develops a foundation for a nuanced theoretical unders...
Article
Full-text available
Denault, V., Plusquellec, P., Jupe, L. M., St-Yves, M., Dunbar, N. E., Hartwig, M., … van Koppen, P. J. (2020). L’analyse de la communication non verbale: Les dangers de la pseudoscience en contextes de sécurité et de justice [The analysis of nonverbal communication: The dangers of pseudoscience in security and justice contexts]. Revue internationa...
Article
This paper discusses the advantages of using posturographic signals from force plates for non-invasive credibility assessment. The contributions of our work are two fold: first, the proposed method is highly efficient and non invasive. Second, feasibility for creating an autonomous credibility assessment system using machine-learning algorithms is...
Chapter
This chapter presents results of an original interactive experiment in which truthful or deceptive interviewees were highly motivated (or not) and interviewed in one of three interaction modalities: face-to-face, audio, or text. Participants committed or observed a mock crime and then were interviewed by trained interviewers. Motivated interviewees...
Article
Full-text available
For security and justice professionals (e.g., police officers, lawyers, judges), the thousands of peer-reviewed articles on nonverbal communication represent important sources of knowledge. However, despite the scope of the scientific work carried out on this subject, professionals can turn to programs, methods, and approaches that fail to reflect...
Article
Full-text available
Para los profesionales de la seguridad y la justicia (policías, abogados, jueces), los miles de artículos revisados por pares sobre comunicación no verbal representan fuentes importantes de conocimiento. Sin embargo, a pesar del alcance del trabajo científico realizado sobre este tema, los profesionales pueden recurrir a programas, métodos y enfoqu...
Conference Paper
We consider the problems of predicting (i) the most dominant person in a group of people, and (ii) the more dominant of a pair of people, from videos depicting group interactions. We introduce a novel family of variables called Dominance Rank. We combine features not previously used for dominance prediction (e.g., facial action units, emotions), wi...
Preprint
Most work on automated deception detection (ADD) in video has two restrictions: (i) it focuses on a video of one person, and (ii) it focuses on a single act of deception in a one or two minute video. In this paper, we propose a new ADD framework which captures long term deception in a group setting. We study deception in the well-known Resistance g...
Article
Many deception studies focus on interviewees who do not confess to wrongdoing; confessions are often treated as anomalies and ignored. This study begins to explore confessions by using a mixed-methods secondary analysis of verbal and nonverbal cues that accompany confessions about wrongdoing. Confederates encouraged participants to cheat for extra...
Article
Ample scientific research has confirmed significant linguistic differences between truthful and deceptive discourse in both laboratory and field experiments. That literature is reviewed, followed by presentation of an experiment that tested the effects of veracity on a wide array of linguistic indicators and tested which effects were moderated by m...
Book
Cambridge Core - Communications - The Cambridge Handbook of Group Interaction Analysis - edited by Elisabeth Brauner
Conference Paper
Full-text available
An Embodied Conversational Agent-based human deception detection system was tested in a laboratory experiment during which some subjects had committed a mock crime and had guilty knowledge of that crime. Sensor signals were analyzed for their ability to discriminate between guilty/deceptive and innocent/truthful examinees and suitability for conduc...
Article
Full-text available
This study investigates the development of an automated interviewing system that uses facial behavior as an indicator of the risk of given illicit behavior. Traditional facial emotion indicators of risk in semistructured dialogue may have limitations in an automated approach. However, an initial analysis of mock crime interviews suggests that the f...
Article
Full-text available
One of the benefits of using digital games for education is that games can provide feedback for learners to assess their situation and correct their mistakes. We conducted two studies to examine the effectiveness of different feedback design (timing, duration, repeats, and feedback source) in a serious game designed to teach learners about cognitiv...
Chapter
Full-text available
Social Signal Processing is the first book to cover all aspects of the modeling, automated detection, analysis, and synthesis of nonverbal behavior in human-human and human-machine interactions. Authoritative surveys address conceptual foundations, machine analysis and synthesis of social signal processing, and applications. Foundational topics inc...
Chapter
Social Signal Processing is the first book to cover all aspects of the modeling, automated detection, analysis, and synthesis of nonverbal behavior in human-human and human-machine interactions. Authoritative surveys address conceptual foundations, machine analysis and synthesis of social signal processing, and applications. Foundational topics inc...
Article
Full-text available
Rapid Judgments (RJs) are quick assessments based on indirect verbal and nonverbal cues that are known to be associated with deception. RJs are advantageous because they eliminate the need for expensive detection equipment and only require minimal training for coders with relatively accurate judgments. Results of testing on two different datasets s...
Article
Objective. Humans systematically make poor decisions because of cognitive biases. Can digital games train people to avoid cognitive biases? The goal of this study is to investigate the affordance of different educational media in training people about cognitive biases and to mitigate cognitive biases within their decision-making processes. Method....
Article
Because userstreatembodiedagents(EAs)associalactors,usersholdexpectationsabouthuman-to-EA communication (HtEAC)similartothoseinhuman-to-humancommunication.Thisstudyextends Expectancy ViolationsTheory(EVT)toexaminehowdifferentformsofinterfacesthatconfirm orviolate user expectationsaffectthecommunicationprocess,socialjudgments,abilitytoinfluence, and...
Article
Full-text available
Eye-tracking technology has exhibited promise for identifying deception in automated screening systems. Prior deception research using eye trackers has focused on the detection and interpretation of brief oculometric variations in response to stimuli (e.g., specific images or interview questions). However, more research is needed to understand how...
Article
Full-text available
Digital games are ideal for training complex decision making skills because they allow players to experience decision making processes and consequences. However, training complex skills often results in failure, which may undermine learning engagement. Traditional training methods employing observational learning (e.g., training videos) do not caus...
Chapter
We are constantly forming impressions about those around us. Social interaction depends on our understanding of interpersonal behavior - assessing one another's personality, emotions, thoughts and feelings, attitudes, deceptiveness, group memberships, and other personal characteristics through facial expressions, body language, voice and spoken lan...
Chapter
Full-text available
Interpersonal deception is a dynamic process in which participating individuals adjust and adapt their behaviors as the deception proceeds. Using THEME, we demonstrate that deceptive communication in group settings is highly patterned. We further examine patterning behavior using the strategy-focused lens of Interpersonal Deception Theory (Buller a...
Book
Drawing significantly on both classic and contemporary research, Nonverbal Communication speaks to today's students with modern examples that illustrate nonverbal communication in their lived experiences. This new edition, authored by three of the foremost scholars in nonverbal communication, builds on the approach pioneered by Burgoon, Buller and...
Book
A thorough look at the different research applications of temporal pattern detection and analysis using specially developed software, THEME (TM). The T-system is a model for discovering hidden recurring patterns in observable behavior and can be useful to researchers in neuroscience, psychology, biology, robotics, finance, medicine, and many other...
Article
Full-text available
Deception is thought to be more effortful than telling the truth. Empirical evidence from many quarters supports this general proposition. However, there are many factors that qualify and even reverse this pattern. Guided by a communication perspective, I present a baker's dozen of moderators that may alter the degree of cognitive difficulty associ...
Chapter
Full-text available
Interpersonal deception theory (IDT) explains the process and outcomes of deception in interpersonal conversations. It focuses on intentional, strategic communication behaviors by interacting senders and receivers in conversations, as well as the involuntary behavior that arises from their affective reactions and cognitions. Articulated are its cor...
Conference Paper
This paper discusses the advantages of using posturographic signals from force plates for non-invasive credibility assessment. The contributions of our work are two fold: first, the proposed method is highly efficient and non invasive. Second, feasibility for creating an autonomous credibility assessment system using machine-learning algorithms is...
Chapter
Full-text available
Expectancy violations theory predicts and explains the effects of nonverbal behavior violations on interpersonal communication outcomes such as attraction, credibility, persuasion, and smooth interactions. Human interactions are strongly governed by expectations which, if violated, are arousing and trigger an appraisal process that may be moderated...
Chapter
Deception detection accuracy concerns the ability of instruments or humans to distinguish truthful from deceptive communication. Accuracy is often described in terms of signal detection theory (hits, the percentage of actual deceptive utterances that are accurately classified as deceit; misses, the percentage of actual deception that is erroneously...
Article
Full-text available
Quarterly conference calls where corporate executives discuss earnings that are later found to be misreported offer an excellent test bed for determining if automated linguistic and vocalic analysis tools can identify potentially fraudulent utterances in prepared versus unscripted remarks. Earnings conference calls from one company that restated th...
Conference Paper
Full-text available
High-stakes lying causes detectable changes in human behavior and physiology. Lie detection techniques based on behavior analysis are unobtrusive, but often require laborintensive efforts. Lie detection techniques based on physiological measurements are more amenable to automated analysis and perhaps more objective, but their often obtrusive nature...
Article
Levine, Clare, Green, Serota and Park (2014) present studies intended to demonstrate that the Park–Levine probability model (PLM) better accounts for accuracy in detecting interactive deception than interpersonal deception theory (IDT). This rejoinder makes 6 points: (a) the PLM is a description not an explanation; (b) IDT and its empirical support...
Article
Full-text available
Screening individuals for concealed information has traditionally been the purview of professional interrogators investigating crimes. However, the ability to detect when a person is hiding important information has high value in many other applications if results could be reliably obtained using an automated and rapid interviewing system. Unfortun...
Chapter
Interpersonal adaptation is a fundamental and pervasive human behavior. Adaptation forms the basis of social and biological development; it enables relationship development, facilitates social influence, marks personality and cultural differences, and is critical to establishing and maintaining social organization. The term “adaptation” encompasses...
Article
Accurate deception detection is a desirable goal with many applications including credibility assessment, security screening, counter-terrorism, and homeland security. However, many deception detection methodologies involve intrusive sensors or other limitations that preclude their use in a covert manner. Posturography may overcome these limitation...